CN115277140B - Policy configuration, risk identification method and device, readable storage medium and computing device - Google Patents
Policy configuration, risk identification method and device, readable storage medium and computing device Download PDFInfo
- Publication number
- CN115277140B CN115277140B CN202210842870.8A CN202210842870A CN115277140B CN 115277140 B CN115277140 B CN 115277140B CN 202210842870 A CN202210842870 A CN 202210842870A CN 115277140 B CN115277140 B CN 115277140B
- Authority
- CN
- China
- Prior art keywords
- rule
- event
- policy
- policies
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 230000000875 corresponding effect Effects 0.000 claims abstract description 135
- 230000009471 action Effects 0.000 claims abstract description 67
- 230000008676 import Effects 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 5
- 230000014509 gene expression Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0637—Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/60—Business processes related to postal services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Educational Administration (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the specification provides a policy configuration and risk identification method and device. The strategy configuration method comprises the following steps: according to the configuration instruction, at least one strategy which can be shared by a plurality of scenes and a plurality of events is configured in a rule center; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; importing a plurality of first strategies in the at least one strategy from a rule center according to a first instruction aiming at a first event of a first scene; and taking the first policies as a first policy set configured for the first event, wherein the first policy set is used for executing corresponding actions according to first characteristic values corresponding to the attribute characteristics of the first event when the first event occurs. The operation of the user configuration strategy can be simplified, so that the configuration efficiency of the user is improved.
Description
Technical Field
One or more embodiments of the present specification relate to the field of computers, and in particular, to policy configuration and risk identification methods and apparatuses.
Background
Currently, the risk recognition result of a scenario-event is often determined based on a configured policy, where the scenario-event represents a certain event in a certain scenario. In a wind control system, a user needs to configure corresponding policies based on different scene-events, sometimes the policies are sharable, i.e., there are sharable policies across scene-events. At present, a policy can only belong to a specific scene-event, for example, one policy needs to be applied to a plurality of scenes-events, but the same policy needs to be repeatedly configured for a plurality of times due to the fact that the policy is not in the same scene, so that the configuration is complicated, and the configuration efficiency of a user is low.
Disclosure of Invention
One or more embodiments of the present disclosure describe a policy configuration and risk identification method and apparatus, which can simplify the operation of a user configuration policy, thereby improving the configuration efficiency of the user.
In a first aspect, a policy configuration method is provided, where the method includes:
according to the configuration instruction, at least one strategy which can be shared by a plurality of scenes and a plurality of events is configured in a rule center; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
Importing a plurality of first strategies in the at least one strategy from a rule center according to a first instruction aiming at a first event of a first scene;
and taking the first policies as a first policy set configured for the first event, wherein the first policy set is used for executing corresponding actions according to first characteristic values corresponding to the attribute characteristics of the first event when the first event occurs.
In one possible embodiment, the method further comprises:
importing a plurality of second policies of the at least one policy from the rule center according to a second instruction for a second event of a second scenario;
and taking the second policies as a second policy set configured for the second event, wherein the second policy set is used for executing corresponding actions according to second characteristic values corresponding to the attribute characteristics of the second event when the second event occurs.
Further, there is an intersection policy for the number of first policies and the number of second policies.
In one possible implementation, any of the policies has a corresponding node type; the node type includes at least one of:
the decision table node adopts an arrangement mode of a two-dimensional array structure for the rule set, one element in the two-dimensional array corresponds to one combination rule and the corresponding action, each combination rule has a preset identification sequence, and for the combination rule with the identification result which is initially identified being satisfied, the action corresponding to the combination rule is output;
The strategy set node comprises a plurality of combination rules which are sequentially arranged and actions corresponding to the combination rules respectively, wherein each combination rule supports sequential identification, and for the combination rules which are initially identified and are satisfied in the identification result, the actions corresponding to the combination rules are output;
the rule node comprises a rule set, and the rule set has corresponding actions when meeting and not meeting;
the policy node comprises a rule set and corresponding actions when the rule set is satisfied.
Further, the first event is a policy event, and a plurality of policies configured for the first event are executed in parallel; the node type corresponding to the first strategy is a strategy node.
Further, the first event is a decision flow event, and a plurality of strategies configured for the first event have a sequential execution sequence; the node type corresponding to the first strategy is a decision table node, a strategy set node or a rule node.
Further, the actions may further include outputting any one of the intermediate processing results or parameter values.
In a possible implementation manner, the importing, according to the first instruction, a number of first policies in the at least one policy from the rule center includes:
according to the first instructions, a plurality of first strategies in the at least one strategy are imported from the rule center in a copying or referencing mode.
In one possible embodiment, the method further comprises:
according to a third instruction, updating the preconfigured at least one policy at the rule center.
In a second aspect, a risk identification method is provided, the method comprising:
loading at least one strategy configured by a rule center and shared by a plurality of scenes and a plurality of events into a memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
when a first event of a first scene occurs, judging whether a plurality of first strategies in the at least one strategy imported from a rule center exist in a first strategy set configured for the first event;
if the judgment result is that a plurality of first strategies imported from a rule center exist in the first strategy set, the plurality of first strategies are read from a memory;
and executing actions in the first strategies according to first characteristic values corresponding to the attribute characteristics of the first event.
In one possible embodiment, the method further comprises:
when a second event of a second scene occurs, judging whether a plurality of second strategies in the at least one strategy imported from the rule center exist in a second strategy set configured for the second event;
If the judgment result is that the second policies are concentrated and a plurality of second policies imported from the rule center exist in the second policy set, the second policies are read from a memory;
and executing actions in the second strategies according to second characteristic values corresponding to the attribute characteristics of the second events.
Further, there is an intersection policy for the number of first policies and the number of second policies.
In a third aspect, there is provided a policy configuration apparatus, the apparatus comprising:
the first configuration unit is used for configuring at least one strategy which can be shared by a plurality of scenes and a plurality of events in a rule center according to the configuration instruction; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
an importing unit, configured to import, from a rule center, a plurality of first policies among at least one policy configured by the first configuration unit according to a first instruction, for a first event of a first scene;
the second configuration unit is used for taking the first policies imported by the importing unit as a first policy set configured for the first event, and the first policy set is used for executing corresponding actions according to the first characteristic values corresponding to the attribute characteristics of the first event when the first event occurs.
In a fourth aspect, there is provided a risk identification apparatus, the apparatus comprising:
the loading unit is used for loading at least one strategy configured by the rule center and shared by a plurality of scenes and a plurality of events into the memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
a judging unit configured to judge whether or not there are a plurality of first policies among the at least one policy imported from the rule center in a first policy set configured for a first event when the first event of a first scene occurs;
the reading unit is used for reading the first strategies loaded by the loading unit from the memory if the judgment result of the judging unit is that the first strategies are concentrated and a plurality of first strategies imported from the rule center exist in the first strategy set;
and the execution unit is used for executing actions in the plurality of first strategies read by the reading unit according to the first characteristic values corresponding to the plurality of attribute characteristics of the first event.
In a fifth aspect, there is provided a computer readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the method of the first or second aspect.
In a sixth aspect, there is provided a computing device comprising a memory having executable code stored therein and a processor which, when executing the executable code, implements the method of the first or second aspect.
According to the policy configuration method and the policy configuration device provided by the embodiment of the specification, at least one policy which can be shared by a plurality of scenes and a plurality of events is configured in a rule center according to a configuration instruction; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; then importing a plurality of first strategies in the at least one strategy from a rule center according to a first instruction aiming at a first event of a first scene; and finally, the first policies are used as a first policy set configured for the first event, and the first policy set is used for executing corresponding actions according to first characteristic values corresponding to the attribute characteristics of the first event when the first event occurs. From the above, in the embodiment of the present disclosure, the rule center is independent, and by configuring the policy in the rule center, the reusability of the policy is achieved, so that the policy can be shared by multiple scenes and multiple events, and the operation of configuring the policy by the user can be simplified, thereby improving the configuration efficiency of the user.
Through the risk identification method and the risk identification device provided by the embodiment of the specification, at least one strategy configured by a rule center and capable of being shared by a plurality of scenes and a plurality of events is loaded into a memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; then when a first event of a first scene occurs, judging whether a plurality of first strategies in the at least one strategy imported from a rule center exist in a first strategy set configured for the first event; then if the judgment result is that a plurality of first strategies imported from a rule center exist in the first strategy set, reading the plurality of first strategies from a memory; and finally, executing actions in the plurality of first strategies according to first characteristic values corresponding to the plurality of attribute characteristics of the first event. Therefore, in the embodiment of the specification, because the policy configured by the rule center has reusability, when a plurality of scenes and a plurality of events share the same policy, a plurality of policies are not required to be loaded, and only one policy in the rule center is required to be loaded, so that the memory utilization rate of the loaded policies in the risk identification process is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic illustration of an implementation scenario of an embodiment disclosed herein;
FIG. 2 illustrates a policy configuration method flow diagram according to one embodiment;
FIG. 3 illustrates a policy composition diagram of a decision table node according to one embodiment;
FIG. 4 illustrates a schematic diagram of policy composition of a policy set node, according to one embodiment;
FIG. 5 illustrates a risk identification method flow diagram according to one embodiment;
FIG. 6 shows a schematic block diagram of a policy configuration device according to one embodiment;
fig. 7 shows a schematic block diagram of a risk identification device according to an embodiment.
Detailed Description
The following describes the scheme provided in the present specification with reference to the drawings.
Fig. 1 is a schematic diagram of an implementation scenario of an embodiment disclosed in the present specification. The implementation scenario involves policy configuration. In the embodiment of the present specification, a scenario includes several events, which is an overview of a specific business behavior that is completed by a plurality of events together, such as a login event and an admission event in a credit scenario. The event includes several attribute features, which may be a hypertext transfer protocol (hyper text transfer protocol, HTTP) request by the user to invoke the wind control service in order to obtain the risk identification result. The attribute features are simply referred to as attributes, and generally comprise three categories, namely business attributes, offline attributes and equipment attributes. Business attributes: user characteristics such as cell phone number, etc.; offline properties: some data acquired by invoking a third party data service; device attributes: the unique identification of the user's login device, such as the media access control (media access control, mac) address of the computer, the international mobile equipment identity (international mobile equipment identity, IMEI) of the handset.
Variables are abstractions reflecting the attribute characteristics of users, and comprise three types of numbers, boolean and character strings, and participate in operation as left values of rules. The rule is a conditional expression and comprises a left value, an operator and a right value, wherein the left value is represented by a variable, the operator comprises more than, less than or equal to the variable, and the right value is a specific comparison object. Rule sets, and or logic operations are performed among rules, so that more complex conditional expressions are realized. Policies, describing the actions that should be taken when a rule set hits, are summaries of the rule set and the setting of the decision results. It is to be appreciated that an action can correspond to a particular decision result that can indicate whether an event is at risk or whether the event passes, e.g., the decision result includes refusal, pass, and pending.
Referring to fig. 1, scenario 1 includes event 1, event 2, and event 3, and policies that need to be configured for scenario 1-event 1 include policy 1 and policy 2; scenario 2 includes event 1 … … event n, and policies that need to be configured for scenario 2-event 1 include policy 1 and policy 3. Wherein policy 1 is a policy common to scenario 1-event 1 and scenario 2-event 1. If a common configuration mode is adopted, the policies are under the scene-event of a certain feature, the same policies which are not in the same scene need to be repeatedly configured for a plurality of times, the configuration is complicated, and the configuration efficiency of users is low.
In the embodiment of the specification, the rule center is independent, and the reusability of the policy is realized by configuring the policy in the rule center, so that the policy can be shared by a plurality of scenes and a plurality of events, the operation of configuring the policy by a user can be simplified, and the configuration efficiency of the user is improved.
FIG. 2 illustrates a flow chart of a policy configuration method according to one embodiment, which may be based on the implementation scenario illustrated in FIG. 1. As shown in fig. 2, the policy configuration method in this embodiment includes the following steps: step 21, according to the configuration instruction, at least one strategy which can be shared by a plurality of scenes and a plurality of events is configured in a rule center; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; step 22, importing a plurality of first strategies in the at least one strategy from a rule center according to a first instruction aiming at a first event of a first scene; step 23, the first policies are used as a first policy set configured for the first event, and the first policy set is used for executing corresponding actions according to the first feature values corresponding to the attribute features of the first event when the first event occurs. Specific implementations of the above steps are described below.
Firstly, at step 21, at least one strategy which can be shared by a plurality of scenes and a plurality of events is configured in a rule center according to a configuration instruction; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result. It will be appreciated that the policies are configured at the rule center such that the policies are independent of the specific scenario-event so that they can be multiplexed.
In one example, any of the policies has a corresponding node type; the node type includes at least one of:
the decision table node adopts an arrangement mode of a two-dimensional array structure for the rule set, one element in the two-dimensional array corresponds to one combination rule and the corresponding action, each combination rule has a preset identification sequence, and for the combination rule with the identification result which is initially identified being satisfied, the action corresponding to the combination rule is output;
the strategy set node comprises a plurality of combination rules which are sequentially arranged and actions corresponding to the combination rules respectively, wherein each combination rule supports sequential identification, and for the combination rules which are initially identified and are satisfied in the identification result, the actions corresponding to the combination rules are output;
The rule node comprises a rule set, and the rule set has corresponding actions when meeting and not meeting;
the policy node comprises a rule set and corresponding actions when the rule set is satisfied.
FIG. 3 illustrates a policy composition diagram of a decision table node according to one embodiment. Referring to fig. 3, the transversal judgment condition 1, the transversal judgment condition 2, the transversal judgment condition 3, the transversal judgment condition 4, the longitudinal judgment condition 1, the longitudinal judgment condition 2, the longitudinal judgment condition 3, and the longitudinal judgment condition 4 are all rules, any transversal judgment condition and any longitudinal judgment condition form a combination rule, each combination rule may have a preset recognition sequence, for example, the combination rule formed by the transversal judgment condition 1 and the longitudinal judgment condition 1 is recognized first, if the combination rule is satisfied, that is, the transversal judgment condition 1 and the longitudinal judgment condition 1 are both satisfied, the action 11 is output, otherwise, the next combination rule is continuously recognized. It will be appreciated that in act i j, i represents the index of the vertical judgment condition in its corresponding combination rule, and j represents the index of the horizontal judgment condition in its corresponding combination rule.
FIG. 4 illustrates a policy composition diagram of a policy set node according to one embodiment. Referring to fig. 4, a combination rule 1 corresponds to an action 1, a combination rule 2 corresponds to an action 2, a combination rule 3 corresponds to an action 3, a combination rule 4 corresponds to an action 4, and each combination rule may have a preset recognition order, for example, the combination rule 1 is recognized first, if the combination rule 1 is satisfied, the action 1 is output, and otherwise, the next combination rule is continuously recognized. It will be appreciated that combining rules may be considered a rule set, and that an and or logical operation may be performed between rules, implementing a more complex conditional expression.
In the embodiment of the present specification, if a policy includes a plurality of actions, the plurality of actions may include outputting any one of intermediate processing results or parameter values in addition to outputting risk identification results.
Then, at step 22, for a first event of a first scenario, a number of first policies of the at least one policy are imported from a rule center according to a first instruction. It will be appreciated that the first instruction is typically a user issued instruction that may be used to instruct selection of and import of a number of first policies from among the various policies already in the rule center. Compared with the independent configuration strategy of the user, the method has the advantages that the operation is simple, and the user experience is good.
In one example, the first event is a policy event, and a plurality of policies configured for the first event are executed in parallel; the node type corresponding to the first strategy is a strategy node.
In this example, the first event may be an event in a transaction scenario, and the multiple policies configured for the first event do not have a sequential execution order, and then actions output by the multiple policies may be integrated to determine a risk identification result corresponding to the first event.
In one example, the first event is a decision flow event, and the plurality of policies configured for the first event have a sequential execution order; the node type corresponding to the first strategy is a decision table node, a strategy set node or a rule node.
In this example, the first event may be an event in a credit scenario, and the multiple policies configured for the first event have a sequential execution order, and if the rule set included in the initially executed policy is satisfied, then an action corresponding to the rule set is output, and a subsequent policy may not be executed.
It will be appreciated that when the first event is a decision flow event, the plurality of policies configured for it may be of different node types. For example, for the decision flow event 1 in a certain scenario, a policy 1, a policy 2 and a policy 3 are configured for the decision flow event 1, where the node type corresponding to the policy 1 is a policy table node, the node type corresponding to the policy 2 is a policy set node, and the node type corresponding to the policy 3 is a rule node. When the first event is a decision flow event, the multiple policies configured for it may also be of the same node type. For example, for the decision flow event 2 in a certain scenario, a policy 4 and a policy 5 are configured for the decision flow event, where the node types corresponding to the policy 4 and the policy 5 are all decision table nodes.
In one example, the importing, according to the first instruction, a number of first policies of the at least one policy from a rule center includes:
according to the first instructions, a plurality of first strategies in the at least one strategy are imported from the rule center in a copying or referencing mode.
In this example, the manner of referencing, like a shallow copy in a programming language, is that the policy configured for the event is just a pointer, points to the policy of the rule center, which has a change, and the policy of the event referencing it changes accordingly; the copying mode is similar to deep copying in programming language, original copy is separated from copy, and change of rule center strategy does not affect event multiplexing strategy.
In one example, the method further comprises:
according to a third instruction, updating the preconfigured at least one policy at the rule center.
In this example, since a policy configured in a rule center can be multiplexed by a plurality of events, by updating a pre-configured policy in the rule center, it is possible to have an effect on all events referencing the policy, similar to the effect of a batch online.
Finally, in step 23, the first policies are used as a first policy set configured for the first event, where the first policy set is used to execute, when the first event occurs, corresponding actions according to a first feature value corresponding to the attribute features of the first event. It will be appreciated that the first characteristic value determines whether a rule set comprised by the policy is satisfied and correspondingly determines a corresponding action, which includes outputting a risk recognition result, in particular the risk recognition result may be equivalent to a decision result, which may indicate whether an event is at risk or whether the event passes, e.g. the decision result includes refusal, pass and pending.
In one example, the method further comprises:
importing a plurality of second policies of the at least one policy from the rule center according to a second instruction for a second event of a second scenario;
and taking the second policies as a second policy set configured for the second event, wherein the second policy set is used for executing corresponding actions according to second characteristic values corresponding to the attribute characteristics of the second event when the second event occurs.
Further, there is an intersection policy for the number of first policies and the number of second policies.
In this example, the intersection policy is reused for the first event and the second event.
According to the strategy configuration method provided by the embodiment of the specification, at least one strategy which can be shared by a plurality of scenes and a plurality of events is configured in a rule center according to a configuration instruction; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; then importing a plurality of first strategies in the at least one strategy from a rule center according to a first instruction aiming at a first event of a first scene; and finally, the first policies are used as a first policy set configured for the first event, and the first policy set is used for executing corresponding actions according to first characteristic values corresponding to the attribute characteristics of the first event when the first event occurs. From the above, in the embodiment of the present disclosure, the rule center is independent, and by configuring the policy in the rule center, the reusability of the policy is achieved, so that the policy can be shared by multiple scenes and multiple events, and the operation of configuring the policy by the user can be simplified, thereby improving the configuration efficiency of the user.
Fig. 5 shows a flow chart of a risk identification method according to one embodiment, which may be based on the implementation scenario shown in fig. 1, and the policy configuration method shown in fig. 2. As shown in fig. 5, the risk identification method in this embodiment includes the steps of:
firstly, in step 51, loading at least one policy configured by a rule center and capable of being shared by a plurality of scenes and a plurality of events into a memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result. It will be appreciated that the policy loaded into memory is a policy that may be used in risk identification.
Then, at step 52, when a first event of the first scenario occurs, it is determined whether there are several first policies in the at least one policy imported from the rule center in a first set of policies configured for the first event. It is understood that the manner of introduction may be by way of reference.
Then, in step 53, if the result of the determination is that there are several first policies imported from the rule center in the first policy set, the several first policies are read from the memory. It can be understood that, because the event configuration policy can be implemented by adopting a policy referring to the rule center, when there is a situation that the same policy is multiplexed by a plurality of events, it is not necessary to load a plurality of identical policies into the memory, but only load the policy of the rule center, thereby reducing the memory usage rate.
Finally, at step 54, actions in the number of first policies are performed based on the first event having a first characteristic value corresponding to a number of attribute characteristics. It will be appreciated that the first characteristic value determines whether a rule set comprised by the policy is satisfied and correspondingly determines a corresponding action, which includes outputting a risk recognition result, in particular the risk recognition result may be equivalent to a decision result, which may indicate whether an event is at risk or whether the event passes, e.g. the decision result includes refusal, pass and pending.
In one example, the method further comprises:
when a second event of a second scene occurs, judging whether a plurality of second strategies in the at least one strategy imported from the rule center exist in a second strategy set configured for the second event;
if the judgment result is that the second policies are concentrated and a plurality of second policies imported from the rule center exist in the second policy set, the second policies are read from a memory;
and executing actions in the second strategies according to second characteristic values corresponding to the attribute characteristics of the second events.
Further, there is an intersection policy for the number of first policies and the number of second policies.
Through the risk identification method provided by the embodiment of the specification, at least one strategy configured by a rule center and capable of being shared by a plurality of scenes and a plurality of events is loaded into a memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; then when a first event of a first scene occurs, judging whether a plurality of first strategies in the at least one strategy imported from a rule center exist in a first strategy set configured for the first event; then if the judgment result is that a plurality of first strategies imported from a rule center exist in the first strategy set, reading the plurality of first strategies from a memory; and finally, executing actions in the plurality of first strategies according to first characteristic values corresponding to the plurality of attribute characteristics of the first event. Therefore, in the embodiment of the specification, because the policy configured by the rule center has reusability, when a plurality of scenes and a plurality of events share the same policy, a plurality of policies are not required to be loaded, and only one policy in the rule center is required to be loaded, so that the memory utilization rate of the loaded policies in the risk identification process is reduced.
In the embodiment of the specification, policy configuration can be realized based on management time, and risk identification can be realized based on running time. Wherein, when managing: a management console on which a user configures attributes, events, scenarios, and policies. When in operation, the method comprises the following steps: and the core application of the wind control system analyzes the event based on the strategy configured by the client and outputs a risk identification result.
The configuration flow at management time may include: selecting node types of strategies to be created in a rule center; storing according to the configured corresponding strategies of the node types, and then putting the node types on line; when configuring a policy for an event, it may be chosen to import from a rule center, with two modes, copy or reference; if the reference is made, the user is not allowed to modify the strategy, and if the strategy needs to be modified, the strategy is modified by going to the rule center; if the policy is copied, the user is allowed to edit the policy; and (3) performing policy online after configuring the policy for the event.
The runtime process flow may include: when the strategy configured for each event is online in management, the strategy is essentially the strategy of the rule center related to the strategy, and when the strategy online notification is acquired in running, the warehouse is started to be loaded, wherein the loading is the warehouse of the strategy of the rule center. When executing the strategy in the event, it needs to judge whether the strategy has a reference relation, if so, executing the strategy of the associated rule center. And (3) warehousing: the memory is used for storing the mapping relation between the strategy and the event which can be used in the running process.
According to another embodiment, there is further provided a policy configuration device, which is configured to perform the method shown in fig. 2 provided in the embodiment of the present specification. Fig. 6 shows a schematic block diagram of a policy configuration device according to one embodiment. As shown in fig. 6, the apparatus 600 includes:
a first configuration unit 61, configured to configure at least one policy that can be shared by a plurality of scenes and a plurality of events in a rule center according to a configuration instruction; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
an importing unit 62, configured to import, from a rule center, a number of first policies among the at least one policy configured by the first configuring unit 61 according to a first instruction, for a first event of a first scenario;
a second configuration unit 63, configured to take the first policies imported by the importing unit 62 as a first policy set configured for the first event, where the first policy set is configured to execute, when the first event occurs, a corresponding action according to a first feature value corresponding to the attribute features that the first event has.
Optionally, as an embodiment, the importing unit 62 is further configured to import, for a second event of a second scenario, a number of second policies of the at least one policy from the rule center according to a second instruction;
The second configuration unit 63 is further configured to use the second policies imported by the importing unit 62 as a second policy set configured for the second event, where the second policy set is configured to execute, when the second event occurs, a corresponding action according to a second feature value corresponding to the attribute features that the second event has.
Further, there is an intersection policy for the number of first policies and the number of second policies.
Optionally, as an embodiment, any of the policies has a corresponding node type; the node type includes at least one of:
the decision table node adopts an arrangement mode of a two-dimensional array structure for the rule set, one element in the two-dimensional array corresponds to one combination rule and the corresponding action, each combination rule has a preset identification sequence, and for the combination rule with the identification result which is initially identified being satisfied, the action corresponding to the combination rule is output;
the strategy set node comprises a plurality of combination rules which are sequentially arranged and actions corresponding to the combination rules respectively, wherein each combination rule supports sequential identification, and for the combination rules which are initially identified and are satisfied in the identification result, the actions corresponding to the combination rules are output;
The rule node comprises a rule set, and the rule set has corresponding actions when meeting and not meeting;
the policy node comprises a rule set and corresponding actions when the rule set is satisfied.
Further, the first event is a policy event, and a plurality of policies configured for the first event are executed in parallel; the node type corresponding to the first strategy is a strategy node.
Further, the first event is a decision flow event, and a plurality of strategies configured for the first event have a sequential execution sequence; the node type corresponding to the first strategy is a decision table node, a strategy set node or a rule node.
With the policy configuration device provided in the embodiment of the present disclosure, first, the first configuration unit 61 configures at least one policy that can be shared by a plurality of scenes and a plurality of events in the rule center according to the configuration instruction; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; the importing unit 62 imports a number of first policies of the at least one policy from the rule center according to the first instruction for a first event of the first scenario; finally, the second configuration unit 63 regards the first policies as a first policy set configured for the first event, where the first policy set is configured to execute, when the first event occurs, a corresponding action according to a first feature value corresponding to the attribute features of the first event. From the above, in the embodiment of the present disclosure, the rule center is independent, and by configuring the policy in the rule center, the reusability of the policy is achieved, so that the policy can be shared by multiple scenes and multiple events, and the operation of configuring the policy by the user can be simplified, thereby improving the configuration efficiency of the user.
According to an embodiment of another aspect, there is further provided a risk identification device, which is configured to perform the method shown in fig. 5 provided in the embodiments of the present specification. Fig. 7 shows a schematic block diagram of a risk identification device according to an embodiment. As shown in fig. 7, the apparatus 700 includes:
a loading unit 71, configured to load at least one policy configured by the rule center and available for sharing by a plurality of scenes and a plurality of events into the memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
a judging unit 72 for judging, when a first event of a first scene occurs, whether or not there are a plurality of first policies among the at least one policy imported from the rule center in a first policy set configured for the first event;
a reading unit 73, configured to read, if the determination result of the determining unit 72 is that the first policies are in the first policy set and there are a plurality of first policies imported from a rule center, a plurality of first policies loaded by the loading unit 71 from a memory;
an execution unit 74, configured to execute the actions in the plurality of first policies read by the reading unit 73 according to the first feature values corresponding to the plurality of attribute features of the first event.
Through the risk identification device provided in the embodiment of the present disclosure, the loading unit 71 loads at least one policy configured by the rule center and capable of being shared by a plurality of scenes and a plurality of events into the memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result; then, the judging unit 72 judges whether or not there are a plurality of first policies among the at least one policy imported from the rule center in the first policy set configured for the first event when the first event of the first scene occurs; then, if the reading unit 73 determines that the first policies are imported from the rule center in the first policy set, the reading unit reads the first policies from the memory; finally, the execution unit 74 executes actions in the number of first policies according to the first feature values corresponding to the number of attribute features that the first event has. Therefore, in the embodiment of the specification, because the policy configured by the rule center has reusability, when a plurality of scenes and a plurality of events share the same policy, a plurality of policies are not required to be loaded, and only one policy in the rule center is required to be loaded, so that the memory utilization rate of the loaded policies in the risk identification process is reduced.
According to an embodiment of another aspect, there is also provided a computer-readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the method described in connection with fig. 2 or 5.
According to an embodiment of yet another aspect, there is also provided a computing device including a memory having executable code stored therein and a processor that, when executing the executable code, implements the method described in connection with fig. 2 or 5.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
The foregoing embodiments have been provided for the purpose of illustrating the general principles of the present invention in further detail, and are not to be construed as limiting the scope of the invention, but are merely intended to cover any modifications, equivalents, improvements, etc. based on the teachings of the invention.
Claims (19)
1. A policy configuration method for policy configuration in a wind control system, comprising:
according to the configuration instruction, at least one strategy which can be shared by a plurality of scenes and a plurality of events is configured in a rule center; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
importing a plurality of first strategies in the at least one strategy from a rule center according to a first instruction aiming at a first event of a first scene;
the first policies are used as a first policy set configured for the first event, and the first policy set is used for executing corresponding actions according to first characteristic values corresponding to the attribute characteristics of the first event when the first event occurs;
any one of the policies has a corresponding node type; the node type includes at least one of:
the decision table node adopts an arrangement mode of a two-dimensional array structure for the rule set, one element in the two-dimensional array corresponds to one combination rule and the corresponding action, each combination rule has a preset identification sequence, and for the combination rule with the identification result which is initially identified being satisfied, the action corresponding to the combination rule is output;
The strategy set node comprises a plurality of combination rules which are sequentially arranged and actions corresponding to the combination rules respectively, wherein each combination rule supports sequential identification, and for the combination rules which are initially identified and are satisfied in the identification result, the actions corresponding to the combination rules are output;
the rule node comprises a rule set, and the rule set has corresponding actions when meeting and not meeting;
the policy node comprises a rule set and corresponding actions when the rule set is satisfied.
2. The method of claim 1, wherein the method further comprises:
importing a plurality of second policies of the at least one policy from the rule center according to a second instruction for a second event of a second scenario;
and taking the second policies as a second policy set configured for the second event, wherein the second policy set is used for executing corresponding actions according to second characteristic values corresponding to the attribute characteristics of the second event when the second event occurs.
3. The method of claim 2, wherein the number of first policies and the number of second policies are present in an intersection policy.
4. The method of claim 1, wherein the first event is a policy event for which configured policies are executed in parallel; the node type corresponding to the first strategy is a strategy node.
5. The method of claim 1, wherein the first event is a decision flow event for which the plurality of policies are configured have a sequential order of execution; the node type corresponding to the first strategy is a decision table node, a strategy set node or a rule node.
6. The method of claim 1, wherein the actions further comprise outputting any one of intermediate processing results or parameter values.
7. The method of claim 1, wherein the importing, from a rule center, a number of first policies of the at least one policy according to a first instruction comprises:
according to the first instructions, a plurality of first strategies in the at least one strategy are imported from the rule center in a copying or referencing mode.
8. The method of claim 1, wherein the method further comprises:
according to a third instruction, updating the preconfigured at least one policy at the rule center.
9. A risk identification method for risk identification in a wind control system, comprising:
loading at least one strategy configured by a rule center and shared by a plurality of scenes and a plurality of events into a memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
When a first event of a first scene occurs, judging whether a plurality of first strategies in the at least one strategy imported from a rule center exist in a first strategy set configured for the first event;
if the judgment result is that a plurality of first strategies imported from a rule center exist in the first strategy set, the plurality of first strategies are read from a memory;
executing actions in the plurality of first strategies according to first characteristic values corresponding to the plurality of attribute characteristics of the first event;
any one of the policies has a corresponding node type; the node type includes at least one of:
the decision table node adopts an arrangement mode of a two-dimensional array structure for the rule set, one element in the two-dimensional array corresponds to one combination rule and the corresponding action, each combination rule has a preset identification sequence, and for the combination rule with the identification result which is initially identified being satisfied, the action corresponding to the combination rule is output;
the strategy set node comprises a plurality of combination rules which are sequentially arranged and actions corresponding to the combination rules respectively, wherein each combination rule supports sequential identification, and for the combination rules which are initially identified and are satisfied in the identification result, the actions corresponding to the combination rules are output;
The rule node comprises a rule set, and the rule set has corresponding actions when meeting and not meeting;
the policy node comprises a rule set and corresponding actions when the rule set is satisfied.
10. The method of claim 9, wherein the method further comprises:
when a second event of a second scene occurs, judging whether a plurality of second strategies in the at least one strategy imported from the rule center exist in a second strategy set configured for the second event;
if the judgment result is that the second policies are concentrated and a plurality of second policies imported from the rule center exist in the second policy set, the second policies are read from a memory;
and executing actions in the second strategies according to second characteristic values corresponding to the attribute characteristics of the second events.
11. The method of claim 10, wherein the number of first policies and the number of second policies are present in an intersection policy.
12. A policy configuration device for policy configuration in a wind control system, comprising:
the first configuration unit is used for configuring at least one strategy which can be shared by a plurality of scenes and a plurality of events in a rule center according to the configuration instruction; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
An importing unit, configured to import, from a rule center, a plurality of first policies among at least one policy configured by the first configuration unit according to a first instruction, for a first event of a first scene;
the second configuration unit is used for taking the first policies imported by the importing unit as a first policy set configured for the first event, wherein the first policy set is used for executing corresponding actions according to first characteristic values corresponding to the attribute characteristics of the first event when the first event occurs;
any one of the policies has a corresponding node type; the node type includes at least one of:
the decision table node adopts an arrangement mode of a two-dimensional array structure for the rule set, one element in the two-dimensional array corresponds to one combination rule and the corresponding action, each combination rule has a preset identification sequence, and for the combination rule with the identification result which is initially identified being satisfied, the action corresponding to the combination rule is output;
the strategy set node comprises a plurality of combination rules which are sequentially arranged and actions corresponding to the combination rules respectively, wherein each combination rule supports sequential identification, and for the combination rules which are initially identified and are satisfied in the identification result, the actions corresponding to the combination rules are output;
The rule node comprises a rule set, and the rule set has corresponding actions when meeting and not meeting;
the policy node comprises a rule set and corresponding actions when the rule set is satisfied.
13. The apparatus of claim 12, wherein the importing unit is further configured to import, from the rule center, a number of second policies of the at least one policy according to a second instruction for a second event of a second scenario;
the second configuration unit is further configured to use the plurality of second policies imported by the importing unit as a second policy set configured for the second event, where the second policy set is configured to execute, when the second event occurs, a corresponding action according to a second feature value corresponding to the plurality of attribute features that the second event has.
14. The apparatus of claim 13, wherein the number of first policies and the number of second policies are present in an intersection policy.
15. The apparatus of claim 12, wherein the first event is a policy event for which configured policies are executed in parallel; the node type corresponding to the first strategy is a strategy node.
16. The apparatus of claim 12, wherein the first event is a decision flow event for which a plurality of policies are configured with a sequential order of execution; the node type corresponding to the first strategy is a decision table node, a strategy set node or a rule node.
17. A risk identification device for risk identification in a wind control system, comprising:
the loading unit is used for loading at least one strategy configured by the rule center and shared by a plurality of scenes and a plurality of events into the memory; any of the policies includes a rule set and corresponding actions set for feature values of attribute features of an event; the actions include outputting a risk identification result;
a judging unit configured to judge whether or not there are a plurality of first policies among the at least one policy imported from the rule center in a first policy set configured for a first event when the first event of a first scene occurs;
the reading unit is used for reading the first strategies loaded by the loading unit from the memory if the judgment result of the judging unit is that the first strategies are concentrated and a plurality of first strategies imported from the rule center exist in the first strategy set;
an execution unit, configured to execute actions in the plurality of first policies read by the reading unit according to first feature values corresponding to the plurality of attribute features of the first event;
any one of the policies has a corresponding node type; the node type includes at least one of:
The decision table node adopts an arrangement mode of a two-dimensional array structure for the rule set, one element in the two-dimensional array corresponds to one combination rule and the corresponding action, each combination rule has a preset identification sequence, and for the combination rule with the identification result which is initially identified being satisfied, the action corresponding to the combination rule is output;
the strategy set node comprises a plurality of combination rules which are sequentially arranged and actions corresponding to the combination rules respectively, wherein each combination rule supports sequential identification, and for the combination rules which are initially identified and are satisfied in the identification result, the actions corresponding to the combination rules are output;
the rule node comprises a rule set, and the rule set has corresponding actions when meeting and not meeting;
the policy node comprises a rule set and corresponding actions when the rule set is satisfied.
18. A computer readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the method of any of claims 1-11.
19. A computing device comprising a memory having executable code stored therein and a processor which, when executing the executable code, implements the method of any of claims 1-11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210842870.8A CN115277140B (en) | 2022-07-18 | 2022-07-18 | Policy configuration, risk identification method and device, readable storage medium and computing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210842870.8A CN115277140B (en) | 2022-07-18 | 2022-07-18 | Policy configuration, risk identification method and device, readable storage medium and computing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115277140A CN115277140A (en) | 2022-11-01 |
CN115277140B true CN115277140B (en) | 2024-01-09 |
Family
ID=83767675
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210842870.8A Active CN115277140B (en) | 2022-07-18 | 2022-07-18 | Policy configuration, risk identification method and device, readable storage medium and computing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115277140B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1988478A (en) * | 2006-12-14 | 2007-06-27 | 上海交通大学 | Integrated tactic managing system based on expandable label language |
CN110046997A (en) * | 2019-01-31 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of transaction risk appraisal procedure, device and electronic equipment |
CN110827032A (en) * | 2019-09-26 | 2020-02-21 | 支付宝(杭州)信息技术有限公司 | Intelligent wind control decision method and system and service processing method and system |
CN111144771A (en) * | 2019-12-30 | 2020-05-12 | 北京每日优鲜电子商务有限公司 | Method and device for determining wind evaluation strategy and computer storage medium |
CN113409138A (en) * | 2021-07-19 | 2021-09-17 | 浙江孚临科技有限公司 | Risk control decision engine device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060048142A1 (en) * | 2004-09-02 | 2006-03-02 | Roese John J | System and method for rapid response network policy implementation |
-
2022
- 2022-07-18 CN CN202210842870.8A patent/CN115277140B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1988478A (en) * | 2006-12-14 | 2007-06-27 | 上海交通大学 | Integrated tactic managing system based on expandable label language |
CN110046997A (en) * | 2019-01-31 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of transaction risk appraisal procedure, device and electronic equipment |
CN110827032A (en) * | 2019-09-26 | 2020-02-21 | 支付宝(杭州)信息技术有限公司 | Intelligent wind control decision method and system and service processing method and system |
CN111144771A (en) * | 2019-12-30 | 2020-05-12 | 北京每日优鲜电子商务有限公司 | Method and device for determining wind evaluation strategy and computer storage medium |
CN113409138A (en) * | 2021-07-19 | 2021-09-17 | 浙江孚临科技有限公司 | Risk control decision engine device |
Also Published As
Publication number | Publication date |
---|---|
CN115277140A (en) | 2022-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8196125B2 (en) | Optimization of policy enforcement | |
RU2678496C2 (en) | Device policy manager | |
CN110096857B (en) | Authority management method, device, equipment and medium for block chain system | |
US11716357B2 (en) | Data access policies | |
CN109818937A (en) | For the control method of Android permission, device and storage medium, electronic device | |
US7937432B2 (en) | State transition management according to a workflow management policy | |
US20190306171A1 (en) | System and method for externally-delegated access control and authorization | |
CN103475637A (en) | Network access control method and system based on IP access behaviors | |
US10509843B2 (en) | Systems and methods for managing tabs in web applications | |
US11716278B1 (en) | System and method for determining the shortest data transfer path in data communication | |
CN109669718A (en) | System permission configuration method, device, equipment and storage medium | |
CN110138767B (en) | Transaction request processing method, device, equipment and storage medium | |
CN104639650A (en) | Fine granularity distributive interface access control method and device | |
CN110278192A (en) | Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet | |
CN113076502A (en) | Parameter control method and system based on request identification | |
US10599755B2 (en) | System and method for automatically inserting correct escaping functions for field references in a multi-tenant computing environment | |
CN115238247A (en) | Data processing method based on zero trust data access control system | |
CN116308521A (en) | Member rights configuration processing method, system, computer equipment and medium | |
CN114239035B (en) | Collaborative process execution system based on block chain and data access control method thereof | |
CN111008873A (en) | User determination method and device, electronic equipment and storage medium | |
CN115277140B (en) | Policy configuration, risk identification method and device, readable storage medium and computing device | |
CN112965760A (en) | Method and device for modifying root directory, electronic equipment and readable storage medium | |
CN116755679A (en) | Service processing method, device, equipment and storage medium | |
CN107040509A (en) | A kind of file transmitting method and device | |
JP5760037B2 (en) | User authentication apparatus, method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |